SlideShare a Scribd company logo
Hardik Thakor-18CE129
Parth Trambadiya-18CE130
HACKING
What is Hacking
 Hacking is an attempt to exploit a computer system or a private network
inside a computer. Simply put, it is the unauthorised access to or control over
computer network security systems for some illicit purpose.
 Hacking is usually doing something which you are not allow to do
Ex.
Viewing information
Viewing other privacy
Type Of ‘HACKERS’
1. Black hat hacker :-
Hack without permission and leak our data and steal money, steal
password, steal information.
2. White hat hacker :-
Hack with permission and do not leak our data ,do not steal money and do
not anything steal .
3. Grey hat hacker :-
Hack without permission but do not leak our data.
Why learn HACKING
 Good scope of Career
Hacking is best for your career and you get higher earning.
 Make Knowledge the power
Hacking develops your logic and build the knowledge.
 Test system security
If you learn hacking then you can check whether you are safe or not.
What are the various qualities a hacker
should posses
 Good coder
 Well knowledgeable person both hard ware as well as software.
 Should have knowledge on security system.
 Trusted person.
Which system require for hacking ?
 Kali linux
 The ‘KALI LINUX’ operating system is use to hacking .
 Kali linux provides all tools for ethical hacking and hacker use this operating
system.
 BackBox
 BackBox Linux is an Ubuntu-based operating system that is used for security
assessment and penetration testing.
New system for Ethical Hacking
 Parrot Security OS
 Parrot Security OS is a mixture of
Frozenbox OS and Kali Linux.
 Moreover, this highly customizable
hacking operating system also comes
with a strong community support.
 This is develop by Frozenbox Team.
 The last Version of this os is parrot
4.1.
Hacker language
1->I or l
3->e
4->a
7->t
9->g
O->o
$->s
|->i or
||->n
||->n
|v|->m
S->z
Z->s
F->ph
Ph->f
X->ck
Ck->k
Hacker language translation
 Example
Hacking is good
H4ck|||g 1$ good
Hacking - process
 Foot printing
Footprinting (also known as reconnaissance) is the technique used for gathering
information about computer systems and the entities they belong to.
 Scanning
Scanning is a set of procedures for identifying live hosts, ports, and services,
discovering Operating system and architecture of target system, Identifying
vulnerabilities and threats in the network. ... Scanning refers to collecting more
information using complex and aggressive reconnaissance techniques.
 Gaining access
Gaining access is the most important phase of an attack in terms of potential
damage, although attackers don't always have to gain access to the system to cause
damage.
 Maintaining access
The 5 Phases of Hacking: Maintaining Access. Once an attacker
gains access to the target system, the attacker can choose to use both the system and
its resources and further use the system as a launch pad to scan and exploit other
systems, or he can keep a low profile and continue exploiting the system.
Hacking prone areas
North america, 67%Europe, 23%
New zealand, 6%
Australia, 2%
South america, 2%
Middle east, 4%
Asia,
6%
Thank you

More Related Content

PPTX
Ethical hacking ppt by shantanu arora
PPTX
Learn Hacking With Gflixacademy
PPT
Ethical Hacking
PPT
Ethical hacking by shivam
PPTX
Hacking- Ethical/ Non-ethical, Cyber Security.
PPTX
Ethical Hacking Redefined
PPT
Hacking Presentation
PPT
IS Security Presentation
Ethical hacking ppt by shantanu arora
Learn Hacking With Gflixacademy
Ethical Hacking
Ethical hacking by shivam
Hacking- Ethical/ Non-ethical, Cyber Security.
Ethical Hacking Redefined
Hacking Presentation
IS Security Presentation

What's hot (20)

PDF
Ce hv6 module 59 how to steal passwords
PPT
Reconnaissance & Scanning
PDF
Introduction of hacking and cracking
PPT
PPTX
Hacking by Pratyush Gupta
PDF
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
PDF
Ceh v5 module 05 system hacking
PPTX
Cybersecurity cyberlab1
PDF
Ceh v5 module 13 web based password cracking techniques
PPTX
Types of Attack in Information and Network Security
PPTX
Security Attack Analysis for Finding and Stopping Network Attacks
PPT
Op Sy 03 Ch 61a
PPTX
Ethical hacking
PPT
Threats to network
PPTX
File security system
PPTX
Hacking intro
PPTX
Hacking final
PPTX
Security & threats Presentation => (Presenter: Komal Mehfooz)
PDF
Ceh v5 module 06 trojans and backdoors
PDF
Ceh v5 module 10 session hijacking
Ce hv6 module 59 how to steal passwords
Reconnaissance & Scanning
Introduction of hacking and cracking
Hacking by Pratyush Gupta
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
Ceh v5 module 05 system hacking
Cybersecurity cyberlab1
Ceh v5 module 13 web based password cracking techniques
Types of Attack in Information and Network Security
Security Attack Analysis for Finding and Stopping Network Attacks
Op Sy 03 Ch 61a
Ethical hacking
Threats to network
File security system
Hacking intro
Hacking final
Security & threats Presentation => (Presenter: Komal Mehfooz)
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 10 session hijacking

Similar to Hacking (20)

PPTX
Introduction to ethical hacking
PPTX
Ethical hacking
PPTX
Ethical hacking/ Penetration Testing
PDF
What is ethical hacking and complete cyber security presentation on this file
DOCX
Ethical hacking
PPT
Introduction to Hacking
PPTX
Hacking and its types V2
PPTX
Ethical hacking and cyber security intro
PPTX
Password Stealing & Enhancing User Authentication Using Opass Protocol
PPTX
How to hack or what is ethical hacking
PPTX
Web security chapter#2
PPTX
Ethical hacking
PPT
Hacking
PPTX
ethical hacking
PPTX
Ethical hacking
PPT
ETHICAL HACKING
PPTX
Fundamental of ethical hacking
PPTX
Hacking
PPTX
Introduction ethical hacking
PPTX
Presentation1
Introduction to ethical hacking
Ethical hacking
Ethical hacking/ Penetration Testing
What is ethical hacking and complete cyber security presentation on this file
Ethical hacking
Introduction to Hacking
Hacking and its types V2
Ethical hacking and cyber security intro
Password Stealing & Enhancing User Authentication Using Opass Protocol
How to hack or what is ethical hacking
Web security chapter#2
Ethical hacking
Hacking
ethical hacking
Ethical hacking
ETHICAL HACKING
Fundamental of ethical hacking
Hacking
Introduction ethical hacking
Presentation1

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Sustainable Sites - Green Building Construction
PDF
Digital Logic Computer Design lecture notes
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
composite construction of structures.pdf
PDF
PPT on Performance Review to get promotions
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
web development for engineering and engineering
Mechanical Engineering MATERIALS Selection
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
bas. eng. economics group 4 presentation 1.pptx
additive manufacturing of ss316l using mig welding
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Internet of Things (IOT) - A guide to understanding
Sustainable Sites - Green Building Construction
Digital Logic Computer Design lecture notes
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
composite construction of structures.pdf
PPT on Performance Review to get promotions
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
web development for engineering and engineering

Hacking

  • 3. What is Hacking  Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.  Hacking is usually doing something which you are not allow to do Ex. Viewing information Viewing other privacy
  • 4. Type Of ‘HACKERS’ 1. Black hat hacker :- Hack without permission and leak our data and steal money, steal password, steal information. 2. White hat hacker :- Hack with permission and do not leak our data ,do not steal money and do not anything steal . 3. Grey hat hacker :- Hack without permission but do not leak our data.
  • 5. Why learn HACKING  Good scope of Career Hacking is best for your career and you get higher earning.  Make Knowledge the power Hacking develops your logic and build the knowledge.  Test system security If you learn hacking then you can check whether you are safe or not.
  • 6. What are the various qualities a hacker should posses  Good coder  Well knowledgeable person both hard ware as well as software.  Should have knowledge on security system.  Trusted person.
  • 7. Which system require for hacking ?  Kali linux  The ‘KALI LINUX’ operating system is use to hacking .  Kali linux provides all tools for ethical hacking and hacker use this operating system.  BackBox  BackBox Linux is an Ubuntu-based operating system that is used for security assessment and penetration testing.
  • 8. New system for Ethical Hacking  Parrot Security OS  Parrot Security OS is a mixture of Frozenbox OS and Kali Linux.  Moreover, this highly customizable hacking operating system also comes with a strong community support.  This is develop by Frozenbox Team.  The last Version of this os is parrot 4.1.
  • 9. Hacker language 1->I or l 3->e 4->a 7->t 9->g O->o $->s |->i or ||->n ||->n |v|->m S->z Z->s F->ph Ph->f X->ck Ck->k
  • 10. Hacker language translation  Example Hacking is good H4ck|||g 1$ good
  • 11. Hacking - process  Foot printing Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to.  Scanning Scanning is a set of procedures for identifying live hosts, ports, and services, discovering Operating system and architecture of target system, Identifying vulnerabilities and threats in the network. ... Scanning refers to collecting more information using complex and aggressive reconnaissance techniques.  Gaining access Gaining access is the most important phase of an attack in terms of potential damage, although attackers don't always have to gain access to the system to cause damage.  Maintaining access The 5 Phases of Hacking: Maintaining Access. Once an attacker gains access to the target system, the attacker can choose to use both the system and its resources and further use the system as a launch pad to scan and exploit other systems, or he can keep a low profile and continue exploiting the system.
  • 12. Hacking prone areas North america, 67%Europe, 23% New zealand, 6% Australia, 2% South america, 2% Middle east, 4% Asia, 6%